From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.3 required=5.0 tests=MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE,RDNS_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 Received: (qmail 28920 invoked from network); 28 Mar 2020 16:17:33 -0000 Received-SPF: pass (primenet.com.au: domain of zsh.org designates 203.24.36.2 as permitted sender) receiver=inbox.vuxu.org; client-ip=203.24.36.2 envelope-from= Received: from unknown (HELO primenet.com.au) (203.24.36.2) by inbox.vuxu.org with ESMTP; 28 Mar 2020 16:17:33 -0000 Received: (qmail 4092 invoked by alias); 28 Mar 2020 16:17:03 -0000 Mailing-List: contact zsh-workers-help@zsh.org; run by ezmlm Precedence: bulk X-No-Archive: yes List-Id: Zsh Workers List List-Post: List-Help: List-Unsubscribe: X-Seq: 45645 Received: (qmail 17678 invoked by uid 1010); 28 Mar 2020 16:17:02 -0000 X-Qmail-Scanner-Diagnostics: from know-smtprelay-omc-8.server.virginmedia.net by f.primenet.com.au (envelope-from , uid 7791) with qmail-scanner-2.11 (clamdscan: 0.102.2/25758. spamassassin: 3.4.2. Clear:RC:0(80.0.253.72):SA:0(-2.0/5.0):. Processed in 3.333135 secs); 28 Mar 2020 16:17:02 -0000 X-Envelope-From: p.w.stephenson@ntlworld.com X-Qmail-Scanner-Mime-Attachments: | X-Qmail-Scanner-Zip-Files: | Received-SPF: pass (ns1.primenet.com.au: SPF record at _smtprelay.virginmedia.com designates 80.0.253.72 as permitted sender) X-Originating-IP: [86.16.88.158] X-Authenticated-User: p.w.stephenson@ntlworld.com X-Spam: 0 X-Authority: v=2.3 cv=br5i+nSi c=1 sm=1 tr=0 a=MiHCjVqLJ44lE3bxSlffFQ==:117 a=MiHCjVqLJ44lE3bxSlffFQ==:17 a=jpOVt7BSZ2e4Z31A5e1TngXxSK0=:19 a=IkcTkHD0fZMA:10 a=RB50JDc-HHs-OD4WmAYA:9 a=QEXdDO2ut3YA:10 Message-ID: <2201b40f6fa12f35742262c572750af47516754f.camel@ntlworld.com> Subject: Re: :P test failure From: Peter Stephenson To: Zsh hackers list Date: Sat, 28 Mar 2020 16:16:21 +0000 In-Reply-To: <20200326222120.4832e6ad@tarpaulin.shahaf.local2> References: <20200326222120.4832e6ad@tarpaulin.shahaf.local2> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5-0ubuntu0.18.04.1 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfEgfSi16uVbM6XhDZcS0WWTiAxG2BE2v+DFpQs8PW4GAUmutDexjighEKzRZzDTjPL0NcSDJQGFpTNjLiYnGxvB8vRZsf+KQcI46A+Al2/kfu6+BPnU2 BevpWw/UGxujVZ1lzryMdxCRRE7rnEYJCwqtpYX/fEGdQPAIktxjFXVf On Thu, 2020-03-26 at 22:21 +0000, Daniel Shahaf wrote: > Peter Stephenson wrote on Thu, 26 Mar 2020 21:27 +0000: > > This doesn't work on my machine: > > > > # This is a bit brittle as it depends on PATH_MAX. > > # We could use sysconf.. > > bad_pwd="/${(l:16000:: :):-}" > > print ${bad_pwd:P} | wc -c > > 0:modifier ':P' with path too long > > > 16002 > > > > The modification fails with error and output > > > > zsh: path expansion failed, using root directory > > 2 > > The behaviour you see is exactly what the test's _expected_ output was > before 45583/0004. Is there any chance that you ran HEAD's tests on an > old zsh binary by accident? Yes, rebuilding does indeed fix it. Somehow I managed to get it built with my patch in but not yours --- probably the result of a merge. Cheers pws